Analysis
-
max time kernel
327s -
max time network
372s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
Resource
win10-20231215-en
General
-
Target
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe
-
Size
6.4MB
-
MD5
2eafb4926d78feb0b61d5b995d0fe6ee
-
SHA1
f6e75678f1dafcb18408452ea948b9ad51b5d83e
-
SHA256
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30
-
SHA512
1885f5874c44a6841be4d53140ad63304e8d1924bb98fe14602d884fbc289ec8913db772a9e2db93e45298d1328700e2000ddab109af3964eaf6f23af61ef78e
-
SSDEEP
196608:1pznZ/ySos+NnrlQ5jrNoIgDJ0I6x/oAP:1pDZk9LQ5vNdeJ0IC
Malware Config
Signatures
-
XMRig Miner payload 20 IoCs
Processes:
resource yara_rule behavioral1/memory/2928-20-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-21-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-22-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-23-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-24-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-26-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-27-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-25-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-30-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-32-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-33-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-34-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-35-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-36-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-38-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-37-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-41-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-42-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-43-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/2928-44-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Creates new service(s) 1 TTPs
-
Stops running service(s) 3 TTPs
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exeiojmibhyhiws.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion iojmibhyhiws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2152 cmd.exe -
Executes dropped EXE 2 IoCs
Processes:
iojmibhyhiws.exepid process 468 2044 iojmibhyhiws.exe -
Loads dropped DLL 1 IoCs
Processes:
pid process 468 -
Suspicious use of SetThreadContext 2 IoCs
Processes:
iojmibhyhiws.exedescription pid process target process PID 2044 set thread context of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 set thread context of 2928 2044 iojmibhyhiws.exe conhost.exe -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exepid process 2544 sc.exe 1444 sc.exe 2144 sc.exe 2128 sc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exeiojmibhyhiws.execonhost.exepid process 2288 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 2288 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 2288 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 2288 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 2288 50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe 2044 iojmibhyhiws.exe 2044 iojmibhyhiws.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe 2928 conhost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 468 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
conhost.exedescription pid process Token: SeLockMemoryPrivilege 2928 conhost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
cmd.exeiojmibhyhiws.exedescription pid process target process PID 2152 wrote to memory of 2388 2152 cmd.exe choice.exe PID 2152 wrote to memory of 2388 2152 cmd.exe choice.exe PID 2152 wrote to memory of 2388 2152 cmd.exe choice.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 1896 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe PID 2044 wrote to memory of 2928 2044 iojmibhyhiws.exe conhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"1⤵
- Checks BIOS information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "FLWCUERA" binpath= "C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe" start= "auto"2⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "FLWCUERA"2⤵
- Launches sc.exe
PID:1444
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\50b50beee2174d403ddba91f4f0b13d8e754ed2f979ad7c60baeb6617249bb30.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:2388
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "FLWCUERA"2⤵
- Launches sc.exe
PID:2144
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog2⤵
- Launches sc.exe
PID:2128
-
-
C:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exeC:\ProgramData\eyfisgalqlbk\iojmibhyhiws.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\conhost.execonhost.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:1896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
323KB
MD548a2bbc7566564cfc938e2c405da8944
SHA18c33bd5fdae18f8d60cb9651139a8d271d612f8e
SHA256b08085641edebc6126cbe638bc185e5fbdf6127aa52c456b33cd7b65a69eb2ea
SHA5124faa2cee5d2b4d8cfd5460a7186f6cfdcd16ac775d0ae99820a086e563a3bb78bae0894261922d2379b4f2c77125881c27c4e41c62a720ba0fd29b03ce8f71f6
-
Filesize
193KB
MD579cdcdc0b18c10547c9bb5160ffc8a86
SHA1b029000a42a4501b862e8b74fef6bd04529923c3
SHA256128bc1e28cb6d25e569a022fceaf9ecd6aa94bd5e1cfbbc8b667ab499783f6f5
SHA51246b0d432f11dd90a7c6c9811bb04862476b68447ec749d98cd8b2ae838aa495a98e0d44522250817e15204fa6d5c3893aabb331e0a4e524a2d9bf6deeac8b275
-
Filesize
961KB
MD540f27044a74d72d0888628572d0c1d90
SHA17cff07c3da97c07bcb36e3da2953f0dd77e9072f
SHA2563e246e9de09f54a200882c424559f205f1dc6ab03031973e08c9df35b4cf5a95
SHA51244187abbf2b9f119b8072c2838e9fd4a2dff70eb3ffb371567a2e8550e0d72ec9213cc657ee08ca7d1033b28c4774d5af00434460d5060b33678465283e1f2f8
-
Filesize
1.1MB
MD58677f564a90c3fce16f04f115aac94cf
SHA1d8a837dd45f998a2d94349caa11db71503920ba6
SHA256b84b9e7cc4910b6316bc9799cb3663a2856aecfc2caa2d37bd4da40d97a96a73
SHA512afa5587c4e41122b025675f520eda201d5f4198e50b3848f6d0933fed6c71d219fdf3f79cf0ea89a1600086d669eb4a71aded900d3f0cd27e6752d0baccfbcbd